Documentation Index
Fetch the complete documentation index at: https://mintlify.com/GhostTroops/scan4all/llms.txt
Use this file to discover all available pages before exploring further.
Overview
scan4all integrates with Nmap to provide powerful port scanning capabilities. When available, Nmap is automatically detected and used for fast, comprehensive port scanning with optimized parameters that can outperform masscan in many scenarios.Enabling Nmap Integration
Prerequisites
Nmap must be installed on your system:Root Password Configuration
Configuration
Enable Priority Nmap
By default, Nmap scanning is enabled when available. Control this behavior with thepriorityNmap flag:
config/config.json:
Optimized Nmap Parameters
scan4all uses carefully tuned Nmap parameters for maximum performance:Parameter Breakdown
| Parameter | Purpose |
|---|---|
-F --top-ports=65535 | Fast scan of common ports |
-n --unique --resolve-all | No DNS resolution, unique results |
-Pn | Skip host discovery (treat all hosts as online) |
-sU -sS | UDP and TCP SYN scanning |
--min-hostgroup 64 | Scan groups of 64 hosts in parallel |
--max-retries 0 | No retries for speed |
--host-timeout 10m | Maximum time per host |
--version-intensity 9 | Aggressive version detection |
--min-rate 2000 | Send at least 2000 packets/second |
-T4 | Aggressive timing template |
Using Nmap Scan Results
Direct Import
You can import existing Nmap XML results directly, skipping the port scanning phase:Custom Nmap Scans
Run your own Nmap scan and import results:Skip Port Scanning
When you already have scan results or want to test specific URLs:Advantages and Limitations
Advantages
Speed
Optimized parameters provide faster scanning than default configurations
Accuracy
Nmap’s mature service detection provides reliable fingerprinting
Protocol Support
Supports 146 protocols with 90,000+ port scanning rules
Limitations
Scan Progress
Monitor scanning progress with statistics:Alternative: Naabu
When Nmap is not available orpriorityNmap=false, scan4all falls back to naabu:
config/config.json:
Script Integration
The Nmap integration is handled byconfig/doNmapScan.sh. You can customize this script for your needs:
config/doNmapScan.sh
Best Practices
- Set Environment Variable: Always export
PPSSWWDDbefore scanning - Test Network: Verify network stability before large scans
- Adjust Rate: Modify
XRateif experiencing packet loss - Monitor Progress: Use
-stats=truefor long-running scans - Save Results: Import Nmap XML for repeat analysis without rescanning
Troubleshooting
Nmap Not Found
Permission Denied
Incomplete Results
See Also
- Port Scanning - Basic port scanning concepts
- Configuration - Complete configuration reference
- Performance Tuning - Optimization techniques